General

  • Target

    3440-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    97ee34202f8cc6d7918a9812e81bd532

  • SHA1

    4d12191748330bc9b0348851423945e81db7bf3b

  • SHA256

    5502d5247ced17350b5c2029ce247c949629d3248defe1f5e4132289f53f3df4

  • SHA512

    99996e241c502e655bfdf6600edc708beadc002f5da67fe10a6e9140e3c3933d7ba28ce18a814ced67f6b2802fc107b6612691e6f691a941335604f8a121cbaa

  • SSDEEP

    1536:hAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFVnVFF3RMWFyobp:hAgAEkoHj/LDdfDRlb8py1VwBj26FbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3440-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections